[RHSA-2024:1688] nodejs:20 security update

Severity Important
Affected Packages 20
CVEs 7

Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)

  • nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)

  • nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)

  • nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896)

  • nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891)

  • nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890)

  • nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017)

Package Affected Version
pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-9.3 < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/npm?arch=s390x&distro=redhat-9.3 < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-9.3 < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-9.3 < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-packaging?distro=redhat-9.3 < 2021.06-4.module+el9.3.0+19518+63aad52d
pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-9.3 < 2021.06-4.module+el9.3.0+19518+63aad52d
pkg:rpm/redhat/nodejs-nodemon?distro=redhat-9.3 < 3.0.1-1.module+el9.3.0.z+20478+84a9f781
pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-docs?distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-9.3 < 20.11.1-1.module+el9.3.0+21385+bac43d5a
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-9.3 redhat npm < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a redhat-9.3 x86_64
Affected pkg:rpm/redhat/npm?arch=s390x&distro=redhat-9.3 redhat npm < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a redhat-9.3 s390x
Affected pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-9.3 redhat npm < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a redhat-9.3 ppc64le
Affected pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-9.3 redhat npm < 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a redhat-9.3 aarch64
Affected pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-9.3 redhat nodejs < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 x86_64
Affected pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-9.3 redhat nodejs < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 s390x
Affected pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-9.3 redhat nodejs < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 ppc64le
Affected pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-9.3 redhat nodejs < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 aarch64
Affected pkg:rpm/redhat/nodejs-packaging?distro=redhat-9.3 redhat nodejs-packaging < 2021.06-4.module+el9.3.0+19518+63aad52d redhat-9.3
Affected pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-9.3 redhat nodejs-packaging-bundler < 2021.06-4.module+el9.3.0+19518+63aad52d redhat-9.3
Affected pkg:rpm/redhat/nodejs-nodemon?distro=redhat-9.3 redhat nodejs-nodemon < 3.0.1-1.module+el9.3.0.z+20478+84a9f781 redhat-9.3
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-9.3 redhat nodejs-full-i18n < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 x86_64
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-9.3 redhat nodejs-full-i18n < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 s390x
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-9.3 redhat nodejs-full-i18n < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 ppc64le
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-9.3 redhat nodejs-full-i18n < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 aarch64
Affected pkg:rpm/redhat/nodejs-docs?distro=redhat-9.3 redhat nodejs-docs < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3
Affected pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-9.3 redhat nodejs-devel < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 x86_64
Affected pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-9.3 redhat nodejs-devel < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 s390x
Affected pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-9.3 redhat nodejs-devel < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 ppc64le
Affected pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-9.3 redhat nodejs-devel < 20.11.1-1.module+el9.3.0+21385+bac43d5a redhat-9.3 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...